Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758.exe
Resource
win10v2004-20220812-en
General
-
Target
60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758.exe
-
Size
64KB
-
MD5
9212076475e4630b6d0c8ba9aeb4c925
-
SHA1
5342d84978a9c294a74b8ad6531a397fb1c4069e
-
SHA256
60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758
-
SHA512
6545b67d1c51dd77d7e77cb96cd52edcfdf9eb6c9b633c51caec1aa4e940a63c301d18e140c057f7685370214494fa3a2e3ea3042c46836489df778d6b83f49c
-
SSDEEP
768:zaqPPDcHe0gmiPXrJkbu48FJXWLXrF1a/dhUyJkvoiHA9ezyWpv5/6l5Tx7:zdbYeciP7JkbuZGX/azvkv2wX5qTl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1680 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 1344 60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758.exe 1344 60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\NVIDIA Media Center Library = "C:\\Users\\Admin\\Admin1\\winlogon.exe" winlogon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NVIDIA Media Center Library = "C:\\Users\\Admin\\Admin1\\winlogon.exe" winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1344 60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758.exe 1680 winlogon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1680 1344 60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758.exe 27 PID 1344 wrote to memory of 1680 1344 60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758.exe 27 PID 1344 wrote to memory of 1680 1344 60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758.exe 27 PID 1344 wrote to memory of 1680 1344 60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758.exe"C:\Users\Admin\AppData\Local\Temp\60abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\Admin1\winlogon.exe"C:\Users\Admin\Admin1\winlogon.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59212076475e4630b6d0c8ba9aeb4c925
SHA15342d84978a9c294a74b8ad6531a397fb1c4069e
SHA25660abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758
SHA5126545b67d1c51dd77d7e77cb96cd52edcfdf9eb6c9b633c51caec1aa4e940a63c301d18e140c057f7685370214494fa3a2e3ea3042c46836489df778d6b83f49c
-
Filesize
64KB
MD59212076475e4630b6d0c8ba9aeb4c925
SHA15342d84978a9c294a74b8ad6531a397fb1c4069e
SHA25660abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758
SHA5126545b67d1c51dd77d7e77cb96cd52edcfdf9eb6c9b633c51caec1aa4e940a63c301d18e140c057f7685370214494fa3a2e3ea3042c46836489df778d6b83f49c
-
Filesize
64KB
MD59212076475e4630b6d0c8ba9aeb4c925
SHA15342d84978a9c294a74b8ad6531a397fb1c4069e
SHA25660abd754a0f0862a910c94ba97cc47775305b946117abaaad740f21a24bda758
SHA5126545b67d1c51dd77d7e77cb96cd52edcfdf9eb6c9b633c51caec1aa4e940a63c301d18e140c057f7685370214494fa3a2e3ea3042c46836489df778d6b83f49c